OR - Security Practices for Online Resources Lesson

Security Practices for Online Resources

As you utilize online resources, you must establish a plan for safety.  This lesson topic will focus on a few security practices. More details will be shared in the Ethics and Cyber Security module

Phishing

Phishing occurs when Internet imposters impersonate a business to trick you into sharing your personal information.  Make sure you do not reply to email, a text message, or pop-up messages that request your personal or financial information. You should also not click on links within these messages because doing so could result in you downloading a virus on your computer.  Understand that legitimate businesses do request personal information through insecure channels.

Cookies

Each time you visit a website, information about you is saved to your browser.  Have you ever performed a search and noticed that one of the ads on the page reflects information about a business in your city or an establishment that interests you?  A cookie is information saved by your web browser when you visit a site. Cookies can be used to collect, store and share bits of information about your online activities. Cookies also can be used to customize your browsing experience, or to deliver ads targeted to you and your interests.  There are several types of cookies.  First-party cookies are used to make your experience on a website more efficient.   This occurs when you frequent a website to shop or have completed an application. You will discover that some of your information appears without you having to type it. Third-party cookies are placed by someone other than the website owner.  These cookies may also be referred to as ad-serving cookies and have been reported to be used to display ads that might interest you however; some online users have discovered that their profile information has been sold and used for unauthorized purposes.   Each time you access a website, click on the Privacy Policy which is typically hidden at the bottom of the first page.  Read through the information to determine how your information is being utilized.  The privacy policy should answer the questions indicated below.

  • What information does the organization collect about me?
  • Is the information necessary for the activity I am engaging in?
  • How does the organization collect information about me? Does the website use cookies?
  • How does the organization use personal information once it is collected? Who will be able to see my information?
  • Do I have a choice about the way information about me is used or shared? How can I make that choice?
  • What assurances do I have that the information is protected?
  • Can I access the information collected about me?
  • Does the organization provide a place where I can take my complaints about the use of my information or have my questions about privacy and information use answered?

Spam

Spam is unwanted electronic junk mail and tends to flood your email Inbox with unsolicited messages.  Spam can be used by hackers in the form of web bugs, viruses, and worms to obtain your personal information and passwords. Once you discover spam, delete it.  You can also install a spam filter with is a type of utility software that captures unsolicited email messages before the messages reach your email Inbox.

Online Resources Self-Assessment

Online Resources Self-Assessment Drag and Drop

[CC BY 4.0] UNLESS OTHERWISE NOTED | IMAGES: LICENSED AND USED ACCORDING TO TERMS OF SUBSCRIPTION